Security What are scanning and analysis tools Scanning and analysis tools are computer programs that used to find vulnerabilities in systems.
For examples, the vulnerabilities of specific hosts, routers,
or even firewalls. • Many scanning and anaylsis tools are developed by hackers community, or so called, ‗hackerware‘. • A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. • Hackers are usually skilled computer programmers with knowledge of computer security.
• Hackers use scanning and analysis tools to find the
vulnerabilities of the network while the same tools can also be used by network defenders to find potential vulnerabilities and secure it. • Categories of scanning and analysis tools • There are several categories of scanning and analysis tools. • 1. port scanners • Port scanners are tools used by both attackers and defenders to identify the computers that are active on a network, as well as the ports and services active on those computers. • 2.network mappers • Network mappers are tools that identify all systems connected to a network. 3. OS detection tools Tools that detect target host‘s operating system. Knowing a host‘s OS is critical is one is to exploit the host‘s vulnerabilities. For example, the known bugs of that OS.
4.Firewall analysis tools
Helps in understanding and discovery of firewall rules and assist the administrator in analyzing the rules to determine exactly what they allow and what they reject 5. Vulnerability scanners Software tools that assess security vulnerabilities in network & hosts and produce a set of scan results. 6.Packet sniffers A network tool that collects copies of packets from the network and analyze s them. What is packet sniffers A packet sniffer is a tool that plugs into a computer network and monitors a network traffic. 7.Wireless sniffers A software or maybe hardware that is capable of capturing & decoding packets as they pass over airwaves. Biometric security system • The biometric security system is a lock and capture mechanism to control access to specific data. In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. • Many organizations, governmental and private, have started adopting high label of access control security systems for physical entry into their facilities. Whether it is a simple non intelligent access control system like a punching in a password, or advanced biometric systems that scan and permit entry very specifically, there are many advantages to employing these security systems. • Biometric systems will collect and store this data in order to use it for verifying personal identity. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. The biometric security system is a lock and capture mechanism to control access to specific data. In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. • Advantages of Biometrics Access Control Syste m • Biometric systems will collect and store this data in order to use it for verifying personal identity. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. • Reduced Requirement for Manpower • Allows Access and Restriction to Multiple Entries and Exits • Internal Levels of Restriction and Access • Time Based Control for Security Systems • Keeping Check of Punch-in and Punch-out Time • Biometric Systems • Face Recognition and Voice Recognition in Biometrics • Simply put, novel biometric measures, such as face or voice recognition belong to the safety authentication measures related to what the user is. • Your iris is as unique as your fingerprints The blood vessels in your eyes and the whorls at the tip of your fingers make you one of a kind. No other person in the world shares exactly those peculiarities. • The Sense Behind Biometric Measures • Biometric measurement is more like mapping your face than like taking a photo of your face. The biometric scanner digitizes thousands of points, distances and proportions of your face distortions. For example, it will compare distances between your chin and your forehead or locate where exactly is your nose. • It will look for patterns in the finger whorls or, in the case of voice recognition, discover the unique shape of a person’s mouth or throat to confirm identit